From: | Mark Rudholm <rudholm@×××××××××.org> | ||
---|---|---|---|
To: | gentoo-server@l.g.o | ||
Subject: | Re: [gentoo-server] Locking out SSH brute-force attacks | ||
Date: | Thu, 06 Oct 2005 00:18:03 | ||
Message-Id: | 43446CA9.4050705@hyperreal.org | ||
In Reply to: | Re: [gentoo-server] Locking out SSH brute-force attacks by Erik Anderson |
1 | Erik Anderson wrote: |
2 | |
3 | >On 10/5/05, Erik Anderson <erikerik@×××××.com> wrote: |
4 | > |
5 | > |
6 | >>http://article.gmane.org/gmane.linux.gentoo.security/2486 |
7 | >> |
8 | >> |
9 | > |
10 | >Whoops - here's a better link to the thread: |
11 | > |
12 | >http://news.gmane.org/find-root.php?message_id=%3c43404CB8.3%40lunatic.net.nz%3e |
13 | > |
14 | > |
15 | In addition to the stuff discussed in that thread, in emergency situations |
16 | (like in response to a current/successful attack) you can define a bogus |
17 | route to the offending IP address or network. |
18 | |
19 | route add bad.person.or.network 127.0.0.1 (or otherwise bogus destination) |
20 | is an effective emergency block. |
21 | -- |
22 | gentoo-server@g.o mailing list |
Subject | Author |
---|---|
Re: [gentoo-server] Locking out SSH brute-force attacks | Luke-Jr <luke-jr@×××××××.org> |